You searched for android | Page 3 of 3 | SC Media

Your search for android returned 29 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Features remove
Features remove

Your search for android returned 29 results

Sort Results:

Relevant Recent
The high-tech hydra: BYOD
Features

The high-tech hydra: BYOD

No a business' size, employees are yearning to connect their personal devices to the corporate network. But fear not: Solutions and best practices are starting to emerge to manage the risk attached with this craze.
Is danger looming: Mobile vulnerabilities
Features

Is danger looming: Mobile vulnerabilities

With users flocking toward mobile platforms, fraudsters will join as well. But businesses have a bigger problem: What to do about employees wanting to use their devices to connect to the corporate network.
cyberattack, ransomware
Features

Assurance on the shore

While the town of Brick on the New Jersey shore maintains a 1950s aura, with the growth of digital media, its public school system had to alleviate engorged traffic on its network, while safeguarding data.
Top 5 influential IT security thinkers
Features

Top 5 influential IT security thinkers

This year-end special section focuses on people who represent the highest degree of professionalism in security, individuals who stand out for their technical skills, managerial prowess, insight and advocacy.
Office mobility: Consumerization of devices
Features

Office mobility: Consumerization of devices

No longer with the option of saying "no" to its employees, organizations are finding that solutions and techniques exist for managing and securing the mobile devices workers wish to connect to the corporate network.
Beyond theory: Mobile malware
Features

Beyond theory: Mobile malware

The "bring your own device" revolution means that skilled malware writers are going to pay more and more attention to pushing their wares on mobile endpoints. How should businesses respond?
Embedded in danger: Web-enabled devices
Features

Embedded in danger: Web-enabled devices

Name a device and, chances are, it soon will have the capability to connect to the internet, if it does not already. Yet, with this web enablement comes a slew of risks for the enterprise.
On the go: Mobile security
Features

On the go: Mobile security

An explosion in smartphones, laptops, USB sticks and other portable devices has brought new security challenges, reports Greg Masters.
Next post in Features